Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-11608 (GCVE-0-2020-11608)
Vulnerability from cvelistv5
Published
2020-04-07 13:55
Modified
2024-08-04 11:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "name": "USN-4345-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4364-1/" }, { "name": "USN-4368-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4368-1/" }, { "name": "USN-4369-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4369-1/" }, { "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "name": "DSA-4698", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4698" }, { "name": "openSUSE-SU-2020:0801", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-13T08:12:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "name": "USN-4345-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4364-1/" }, { "name": "USN-4368-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4368-1/" }, { "name": "USN-4369-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4369-1/" }, { "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "name": "DSA-4698", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4698" }, { "name": "openSUSE-SU-2020:0801", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "name": "USN-4345-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4364-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4364-1/" }, { "name": "USN-4368-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4368-1/" }, { "name": "USN-4369-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4369-1/" }, { "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "name": "DSA-4698", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4698" }, { "name": "openSUSE-SU-2020:0801", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11608", "datePublished": "2020-04-07T13:55:08", "dateReserved": "2020-04-07T00:00:00", "dateUpdated": "2024-08-04T11:35:13.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-11608\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-04-07T14:15:14.090\",\"lastModified\":\"2024-11-21T04:58:13.947\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en el kernel de Linux versiones anteriores a 5.6.1. El archivo drivers/media/usb/gspca/ov519.c, permite desreferencias del puntero NULL en las funciones ov511_mode_init_regs y ov518_mode_init_regs cuando hay cero endpoints, tambi\u00e9n se conoce como CID-998912346c0d.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.6.1\",\"matchCriteriaId\":\"BB94C1F6-38C4-44F6-93E8-199096A6F86A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20200430-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4364-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4368-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4369-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2020/dsa-4698\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20200430-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4364-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4368-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4369-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2020/dsa-4698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2021:1578
Vulnerability from csaf_redhat
Published
2021-05-18 15:49
Modified
2025-08-04 12:22
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1578", "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848084" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1859244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859244" }, { "category": "external", "summary": "1860479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860479" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1873759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873759" }, { "category": "external", "summary": "1876840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876840" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1890373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890373" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1903387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903387" }, { "category": "external", "summary": "1903983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903983" }, { "category": "external", "summary": "1911343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911343" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1578.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:22:19+00:00", "generator": { "date": "2025-08-04T12:22:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:1578", "initial_release_date": "2021-05-18T15:49:33+00:00", "revision_history": [ { "date": "2021-05-18T15:49:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T15:49:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:22:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-0:4.18.0-305.el8.aarch64", "product_id": "perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-0:4.18.0-305.el8.ppc64le", "product_id": "perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-0:4.18.0-305.el8.x86_64", "product_id": "perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-0:4.18.0-305.el8.s390x", "product_id": "bpftool-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-0:4.18.0-305.el8.s390x", "product_id": "kernel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.s390x", "product": { "name": "perf-0:4.18.0-305.el8.s390x", "product_id": "perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.src", "product": { "name": "kernel-0:4.18.0-305.el8.src", "product_id": "kernel-0:4.18.0-305.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product_id": "kernel-doc-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18811", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777455" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s\r\nsof_set_get_large_ctrl_data function, in the way it handled memory cleanup in a specific error path. A local attacker could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18811" }, { "category": "external", "summary": "RHBZ#1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the snd-sof module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-sof /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-sof.conf\n\nThe system will need to be restarted if the snd-sof module is already loaded. In most circumstances, the snd-sof kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c" }, { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36322", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1949560" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in fuse_do_getattr in fs/fuse/dir.c in the kernel side of the FUSE filesystem in the Linux kernel. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux from 8.3 and prior the versions. RHEL 8.4 and later versions are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36322" }, { "category": "external", "summary": "RHBZ#1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36322", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454" } ], "release_date": "2020-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations" }, { "cve": "CVE-2020-36557", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2112688" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Virtual Terminal subsystem in how a user calls the VT_DISALLOCATE ioctl during the closing/opening of ttys. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown().", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36557" }, { "category": "external", "summary": "RHBZ#2112688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36557", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220" } ], "release_date": "2020-03-21T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown()." }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2021:1739
Vulnerability from csaf_redhat
Published
2021-05-18 16:07
Modified
2025-08-04 12:22
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1739", "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1886109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886109" }, { "category": "external", "summary": "1894793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894793" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1896842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896842" }, { "category": "external", "summary": "1897869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897869" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1739.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T12:22:29+00:00", "generator": { "date": "2025-08-04T12:22:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:1739", "initial_release_date": "2021-05-18T16:07:21+00:00", "revision_history": [ { "date": "2021-05-18T16:07:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T16:07:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:22:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.rt7.72.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
opensuse-su-2020:0801-1
Vulnerability from csaf_opensuse
Published
2020-06-12 15:14
Modified
2020-06-12 15:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20806: Fixed a null pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).
- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).
- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- cifs: Allocate encryption header through kmalloc (bsc#1144333).
- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).
- cifs: check new file size when extending file by fallocate (bsc#1144333).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- cifs: do not share tcons with DFS (bsc#1144333).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- cifs: ensure correct super block for DFS reconnect (bsc#1144333).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- cifs: smbd: Check send queue size before posting a send (bsc#1144333).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- cifs: smbd: Merge code to track pending packets (bsc#1144333).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- cifs: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279)
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279)
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kABI fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- keys: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4-Fix-OPEN-CLOSE-race.patch
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- Redo patch for SLE15-SP1, based on feedback from IBM: patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers (bsc#1171244 LTC#185785 git-fixes).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3-fix-performance-regression-with-setting-mtime.patch
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)
- Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).
- Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).
- Update references: patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817 LTC#185819 git-fixes).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: cdc-acm: restore capability check order (git-fixes).
- usb: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- usb: gadget: composite: Inform controller driver of self-powered (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usb: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- usb: serial: garmin_gps: add sanity checking for data length (git-fixes).
- usb: serial: option: add BroadMobi BM806U (git-fixes).
- usb: serial: option: add support for ASKEY WWHC050 (git-fixes).
- usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- usb: serial: qcserial: Add DW5816e support (git-fixes).
- usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
openSUSE-2020-801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n- CVE-2019-20806: Fixed a null pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).\n- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).\n- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- cifs: Allocate encryption header through kmalloc (bsc#1144333).\n- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n- cifs: check new file size when extending file by fallocate (bsc#1144333).\n- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- cifs: do not share tcons with DFS (bsc#1144333).\n- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- cifs: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- cifs: smbd: Merge code to track pending packets (bsc#1144333).\n- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- cifs: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279)\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kABI fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- keys: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4-Fix-OPEN-CLOSE-race.patch\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- Redo patch for SLE15-SP1, based on feedback from IBM: patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers (bsc#1171244 LTC#185785 git-fixes).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3-fix-performance-regression-with-setting-mtime.patch\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- sunrpc: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n- Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n- Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).\n- Update references: patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817 LTC#185819 git-fixes).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: cdc-acm: restore capability check order (git-fixes).\n- usb: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- usb: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- usb: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- usb: serial: option: add BroadMobi BM806U (git-fixes).\n- usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- usb: serial: qcserial: Add DW5816e support (git-fixes).\n- usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86: hyperv: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0801-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0801-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0801-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090036", "url": "https://bugzilla.suse.com/1090036" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170740", "url": "https://bugzilla.suse.com/1170740" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171252", "url": "https://bugzilla.suse.com/1171252" }, { "category": "self", "summary": "SUSE Bug 1171254", "url": "https://bugzilla.suse.com/1171254" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-12T15:14:33Z", "generator": { "date": "2020-06-12T15:14:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0801-1", "initial_release_date": "2020-06-12T15:14:33Z", "revision_history": [ { "date": "2020-06-12T15:14:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.52.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:1255-1
Vulnerability from csaf_suse
Published
2020-05-26 14:11
Modified
2020-05-26 14:11
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).
- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).
- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).
- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)
The following non-security bugs were fixed:
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1155311).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).
- cgroup: avoid copying strings longer than the buffers (bsc#1146544).
- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/asm: Add a patch_site macro & helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).
- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
Patchnames
SUSE-2020-1255,SUSE-OpenStack-Cloud-7-2020-1255,SUSE-SLE-HA-12-SP2-2020-1255,SUSE-SLE-SAP-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-BCL-2020-1255
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).\n- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).\n- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).\n- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).\n- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).\n- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).\n- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).\n- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).\n- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).\n- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).\n- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).\n- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).\n- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).\n- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).\n- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).\n- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the \u0027MDS\u0027 Microarchitectural Data Sampling attacks were not complete.\n An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)\n\n\nThe following non-security bugs were fixed:\n\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1155311).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1155311).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).\n- cgroup: avoid copying strings longer than the buffers (bsc#1146544).\n- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).\n- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- ipv4: correct gso_size for UFO (bsc#1154844).\n- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).\n- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).\n- powerpc/64s: Add support for software count cache flush (bsc#1131107).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc/asm: Add a patch_site macro \u0026 helpers for patching instructions (bsc#1131107).\n- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).\n- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).\n- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).\n- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).\n- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1255,SUSE-OpenStack-Cloud-7-2020-1255,SUSE-SLE-HA-12-SP2-2020-1255,SUSE-SLE-SAP-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-BCL-2020-1255", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1255-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1255-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1255-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" }, { "category": "self", "summary": "SUSE Bug 1037216", "url": "https://bugzilla.suse.com/1037216" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087813", "url": "https://bugzilla.suse.com/1087813" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1099279", "url": "https://bugzilla.suse.com/1099279" }, { "category": "self", "summary": "SUSE Bug 1120386", "url": "https://bugzilla.suse.com/1120386" }, { "category": "self", "summary": "SUSE Bug 1131107", "url": "https://bugzilla.suse.com/1131107" }, { "category": "self", "summary": "SUSE Bug 1133147", "url": "https://bugzilla.suse.com/1133147" }, { "category": "self", "summary": "SUSE Bug 1136449", "url": "https://bugzilla.suse.com/1136449" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146544", "url": "https://bugzilla.suse.com/1146544" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1149591", "url": "https://bugzilla.suse.com/1149591" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1154844", "url": "https://bugzilla.suse.com/1154844" }, { "category": "self", "summary": "SUSE Bug 1155311", "url": "https://bugzilla.suse.com/1155311" }, { "category": "self", "summary": "SUSE Bug 1155897", "url": "https://bugzilla.suse.com/1155897" }, { "category": "self", "summary": "SUSE Bug 1156060", "url": "https://bugzilla.suse.com/1156060" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157042", "url": "https://bugzilla.suse.com/1157042" }, { "category": "self", "summary": "SUSE Bug 1157070", "url": "https://bugzilla.suse.com/1157070" }, { "category": "self", "summary": "SUSE Bug 1157143", "url": "https://bugzilla.suse.com/1157143" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157158", "url": "https://bugzilla.suse.com/1157158" }, { "category": "self", "summary": "SUSE Bug 1157303", "url": "https://bugzilla.suse.com/1157303" }, { "category": "self", "summary": "SUSE Bug 1157324", "url": "https://bugzilla.suse.com/1157324" }, { "category": "self", "summary": "SUSE Bug 1157333", "url": "https://bugzilla.suse.com/1157333" }, { "category": "self", "summary": "SUSE Bug 1157464", "url": "https://bugzilla.suse.com/1157464" }, { "category": "self", "summary": "SUSE Bug 1157804", "url": "https://bugzilla.suse.com/1157804" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158021", "url": "https://bugzilla.suse.com/1158021" }, { "category": "self", "summary": "SUSE Bug 1158132", "url": "https://bugzilla.suse.com/1158132" }, { "category": "self", "summary": "SUSE Bug 1158381", "url": "https://bugzilla.suse.com/1158381" }, { "category": "self", "summary": "SUSE Bug 1158394", "url": "https://bugzilla.suse.com/1158394" }, { "category": "self", "summary": "SUSE Bug 1158398", "url": "https://bugzilla.suse.com/1158398" }, { "category": "self", "summary": "SUSE Bug 1158410", "url": "https://bugzilla.suse.com/1158410" }, { "category": "self", "summary": "SUSE Bug 1158413", "url": "https://bugzilla.suse.com/1158413" }, { "category": "self", "summary": "SUSE Bug 1158417", "url": "https://bugzilla.suse.com/1158417" }, { "category": "self", "summary": "SUSE Bug 1158427", "url": "https://bugzilla.suse.com/1158427" }, { "category": "self", "summary": "SUSE Bug 1158445", "url": "https://bugzilla.suse.com/1158445" }, { "category": "self", "summary": "SUSE Bug 1158819", "url": "https://bugzilla.suse.com/1158819" }, { "category": "self", "summary": "SUSE Bug 1158823", "url": "https://bugzilla.suse.com/1158823" }, { "category": "self", "summary": "SUSE Bug 1158824", "url": "https://bugzilla.suse.com/1158824" }, { "category": "self", "summary": "SUSE Bug 1158827", "url": "https://bugzilla.suse.com/1158827" }, { "category": "self", "summary": "SUSE Bug 1158834", "url": "https://bugzilla.suse.com/1158834" }, { "category": "self", "summary": "SUSE Bug 1158900", "url": "https://bugzilla.suse.com/1158900" }, { "category": "self", "summary": "SUSE Bug 1158903", "url": "https://bugzilla.suse.com/1158903" }, { "category": "self", "summary": "SUSE Bug 1158904", "url": "https://bugzilla.suse.com/1158904" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1159285", "url": "https://bugzilla.suse.com/1159285" }, { "category": "self", "summary": "SUSE Bug 1159297", "url": "https://bugzilla.suse.com/1159297" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159910", "url": "https://bugzilla.suse.com/1159910" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1159912", "url": "https://bugzilla.suse.com/1159912" }, { "category": "self", "summary": "SUSE Bug 1160195", "url": "https://bugzilla.suse.com/1160195" }, { "category": "self", "summary": "SUSE Bug 1162227", "url": "https://bugzilla.suse.com/1162227" }, { "category": "self", "summary": "SUSE Bug 1162298", "url": "https://bugzilla.suse.com/1162298" }, { "category": "self", "summary": "SUSE Bug 1162928", "url": "https://bugzilla.suse.com/1162928" }, { "category": "self", "summary": "SUSE Bug 1162929", "url": "https://bugzilla.suse.com/1162929" }, { "category": "self", "summary": "SUSE Bug 1162931", "url": "https://bugzilla.suse.com/1162931" }, { "category": "self", "summary": "SUSE Bug 1163971", "url": "https://bugzilla.suse.com/1163971" }, { "category": "self", "summary": "SUSE Bug 1164069", "url": "https://bugzilla.suse.com/1164069" }, { "category": "self", "summary": "SUSE Bug 1164078", "url": "https://bugzilla.suse.com/1164078" }, { "category": "self", "summary": "SUSE Bug 1164846", "url": "https://bugzilla.suse.com/1164846" }, { "category": "self", "summary": "SUSE Bug 1165111", "url": "https://bugzilla.suse.com/1165111" }, { "category": "self", "summary": "SUSE Bug 1165311", "url": "https://bugzilla.suse.com/1165311" }, { "category": "self", "summary": "SUSE Bug 1165873", "url": "https://bugzilla.suse.com/1165873" }, { "category": "self", "summary": "SUSE Bug 1165881", "url": "https://bugzilla.suse.com/1165881" }, { "category": "self", "summary": "SUSE Bug 1165984", "url": "https://bugzilla.suse.com/1165984" }, { "category": "self", "summary": "SUSE Bug 1165985", "url": "https://bugzilla.suse.com/1165985" }, { "category": "self", "summary": "SUSE Bug 1167629", "url": "https://bugzilla.suse.com/1167629" }, { "category": "self", "summary": "SUSE Bug 1168075", "url": "https://bugzilla.suse.com/1168075" }, { "category": "self", "summary": "SUSE Bug 1168295", "url": "https://bugzilla.suse.com/1168295" }, { "category": "self", "summary": "SUSE Bug 1168424", "url": "https://bugzilla.suse.com/1168424" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18255 page", "url": "https://www.suse.com/security/cve/CVE-2017-18255/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-21008 page", "url": "https://www.suse.com/security/cve/CVE-2018-21008/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15213 page", "url": "https://www.suse.com/security/cve/CVE-2019-15213/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18660 page", "url": "https://www.suse.com/security/cve/CVE-2019-18660/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18675 page", "url": "https://www.suse.com/security/cve/CVE-2019-18675/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18683 page", "url": "https://www.suse.com/security/cve/CVE-2019-18683/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19052 page", "url": "https://www.suse.com/security/cve/CVE-2019-19052/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19062 page", "url": "https://www.suse.com/security/cve/CVE-2019-19062/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19066 page", "url": "https://www.suse.com/security/cve/CVE-2019-19066/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19073 page", "url": "https://www.suse.com/security/cve/CVE-2019-19073/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19074 page", "url": "https://www.suse.com/security/cve/CVE-2019-19074/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19319 page", "url": "https://www.suse.com/security/cve/CVE-2019-19319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19523 page", "url": "https://www.suse.com/security/cve/CVE-2019-19523/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19524 page", "url": "https://www.suse.com/security/cve/CVE-2019-19524/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19525 page", "url": "https://www.suse.com/security/cve/CVE-2019-19525/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19527 page", "url": "https://www.suse.com/security/cve/CVE-2019-19527/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19530 page", "url": "https://www.suse.com/security/cve/CVE-2019-19530/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19531 page", "url": "https://www.suse.com/security/cve/CVE-2019-19531/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19532 page", "url": "https://www.suse.com/security/cve/CVE-2019-19532/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19533 page", "url": "https://www.suse.com/security/cve/CVE-2019-19533/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19534 page", "url": "https://www.suse.com/security/cve/CVE-2019-19534/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19535 page", "url": "https://www.suse.com/security/cve/CVE-2019-19535/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19536 page", "url": "https://www.suse.com/security/cve/CVE-2019-19536/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19537 page", "url": "https://www.suse.com/security/cve/CVE-2019-19537/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19767 page", "url": "https://www.suse.com/security/cve/CVE-2019-19767/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19768 page", "url": "https://www.suse.com/security/cve/CVE-2019-19768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20054 page", "url": "https://www.suse.com/security/cve/CVE-2019-20054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3701 page", "url": "https://www.suse.com/security/cve/CVE-2019-3701/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5108 page", "url": "https://www.suse.com/security/cve/CVE-2019-5108/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10942 page", "url": "https://www.suse.com/security/cve/CVE-2020-10942/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11494 page", "url": "https://www.suse.com/security/cve/CVE-2020-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8647 page", "url": "https://www.suse.com/security/cve/CVE-2020-8647/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8649 page", "url": "https://www.suse.com/security/cve/CVE-2020-8649/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8992 page", "url": "https://www.suse.com/security/cve/CVE-2020-8992/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9383 page", "url": "https://www.suse.com/security/cve/CVE-2020-9383/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-05-26T14:11:09Z", "generator": { "date": "2020-05-26T14:11:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1255-1", "initial_release_date": "2020-05-26T14:11:09Z", "revision_history": [ { "date": "2020-05-26T14:11:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.129.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.129.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.129.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.129.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.129.1.aarch64", "product_id": "kernel-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.129.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.129.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.129.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.129.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.129.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.129.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.129.1.aarch64", "product_id": "kernel-syms-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.129.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.129.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.129.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.129.1.noarch", "product_id": "kernel-devel-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.129.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.129.1.noarch", "product_id": "kernel-docs-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.129.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.129.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.129.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.129.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.129.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.129.1.noarch", "product_id": "kernel-macros-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.129.1.noarch", "product": { "name": "kernel-source-4.4.121-92.129.1.noarch", "product_id": "kernel-source-4.4.121-92.129.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.129.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.129.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.129.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.129.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.129.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.129.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.129.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.129.1.ppc64le", "product_id": "kernel-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.129.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.129.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.129.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.129.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.129.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.129.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.129.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-4.4.121-92.129.1.s390x", "product_id": "kernel-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.129.1.s390x", "product_id": "kernel-default-base-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.129.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.129.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.129.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.129.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.129.1.s390x", "product_id": "kernel-default-man-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.129.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.129.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.129.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.129.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.129.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.129.1.s390x", "product_id": "kernel-syms-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.129.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.129.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.129.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.129.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.129.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.129.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.129.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.129.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.129.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.129.1.x86_64", "product_id": "kernel-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.129.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.129.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.129.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.129.1.x86_64", "product_id": "kernel-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.129.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.129.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.129.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.129.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.129.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.129.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.129.1.x86_64", "product_id": "kernel-syms-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.129.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.129.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.129.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.129.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.129.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18255", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18255" } ], "notes": [ { "category": "general", "text": "The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18255", "url": "https://www.suse.com/security/cve/CVE-2017-18255" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18255", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087813 for CVE-2017-18255", "url": "https://bugzilla.suse.com/1087813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2017-18255" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-21008", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-21008" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-21008", "url": "https://www.suse.com/security/cve/CVE-2018-21008" }, { "category": "external", "summary": "SUSE Bug 1149591 for CVE-2018-21008", "url": "https://bugzilla.suse.com/1149591" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2018-21008" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-15213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15213" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15213", "url": "https://www.suse.com/security/cve/CVE-2019-15213" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146544 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146544" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-15213" }, { "cve": "CVE-2019-18660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18660" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18660", "url": "https://www.suse.com/security/cve/CVE-2019-18660" }, { "category": "external", "summary": "SUSE Bug 1157038 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157038" }, { "category": "external", "summary": "SUSE Bug 1157923 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-18660" }, { "cve": "CVE-2019-18675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18675" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18675", "url": "https://www.suse.com/security/cve/CVE-2019-18675" }, { "category": "external", "summary": "SUSE Bug 1157804 for CVE-2019-18675", "url": "https://bugzilla.suse.com/1157804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-18675" }, { "cve": "CVE-2019-18683", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18683" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18683", "url": "https://www.suse.com/security/cve/CVE-2019-18683" }, { "category": "external", "summary": "SUSE Bug 1155897 for CVE-2019-18683", "url": "https://bugzilla.suse.com/1155897" }, { "category": "external", "summary": "SUSE Bug 1173868 for CVE-2019-18683", "url": "https://bugzilla.suse.com/1173868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-18683" }, { "cve": "CVE-2019-19052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19052" } ], "notes": [ { "category": "general", "text": "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19052", "url": "https://www.suse.com/security/cve/CVE-2019-19052" }, { "category": "external", "summary": "SUSE Bug 1157324 for CVE-2019-19052", "url": "https://bugzilla.suse.com/1157324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19052" }, { "cve": "CVE-2019-19062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19062" } ], "notes": [ { "category": "general", "text": "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19062", "url": "https://www.suse.com/security/cve/CVE-2019-19062" }, { "category": "external", "summary": "SUSE Bug 1157333 for CVE-2019-19062", "url": "https://bugzilla.suse.com/1157333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19062" }, { "cve": "CVE-2019-19066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19066" } ], "notes": [ { "category": "general", "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19066", "url": "https://www.suse.com/security/cve/CVE-2019-19066" }, { "category": "external", "summary": "SUSE Bug 1157303 for CVE-2019-19066", "url": "https://bugzilla.suse.com/1157303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19066" }, { "cve": "CVE-2019-19073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19073" } ], "notes": [ { "category": "general", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19073", "url": "https://www.suse.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "SUSE Bug 1157070 for CVE-2019-19073", "url": "https://bugzilla.suse.com/1157070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19073" }, { "cve": "CVE-2019-19074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19074" } ], "notes": [ { "category": "general", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19074", "url": "https://www.suse.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "SUSE Bug 1157143 for CVE-2019-19074", "url": "https://bugzilla.suse.com/1157143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19074" }, { "cve": "CVE-2019-19319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19319", "url": "https://www.suse.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "SUSE Bug 1158021 for CVE-2019-19319", "url": "https://bugzilla.suse.com/1158021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19319" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-19523", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19523" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19523", "url": "https://www.suse.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19523" }, { "cve": "CVE-2019-19524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19524" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19524", "url": "https://www.suse.com/security/cve/CVE-2019-19524" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158413 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158413" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2019-19524" }, { "cve": "CVE-2019-19525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19525" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19525", "url": "https://www.suse.com/security/cve/CVE-2019-19525" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158417 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158417" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19525" }, { "cve": "CVE-2019-19527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19527" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19527", "url": "https://www.suse.com/security/cve/CVE-2019-19527" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158900 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19527" }, { "cve": "CVE-2019-19530", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19530" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19530", "url": "https://www.suse.com/security/cve/CVE-2019-19530" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158410 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158410" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19530" }, { "cve": "CVE-2019-19531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19531" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19531", "url": "https://www.suse.com/security/cve/CVE-2019-19531" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158427 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158427" }, { "category": "external", "summary": "SUSE Bug 1158445 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158445" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2019-19531" }, { "cve": "CVE-2019-19532", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19532" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19532", "url": "https://www.suse.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158824 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158824" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19532" }, { "cve": "CVE-2019-19533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19533" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19533", "url": "https://www.suse.com/security/cve/CVE-2019-19533" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19533", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19533", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19533" }, { "cve": "CVE-2019-19534", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19534" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19534", "url": "https://www.suse.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158398 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158398" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2019-19534" }, { "cve": "CVE-2019-19535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19535" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19535", "url": "https://www.suse.com/security/cve/CVE-2019-19535" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158903 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19535" }, { "cve": "CVE-2019-19536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19536" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19536", "url": "https://www.suse.com/security/cve/CVE-2019-19536" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158394 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158394" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2019-19536" }, { "cve": "CVE-2019-19537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19537" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19537", "url": "https://www.suse.com/security/cve/CVE-2019-19537" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158904 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19537" }, { "cve": "CVE-2019-19767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19767" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19767", "url": "https://www.suse.com/security/cve/CVE-2019-19767" }, { "category": "external", "summary": "SUSE Bug 1159297 for CVE-2019-19767", "url": "https://bugzilla.suse.com/1159297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19767" }, { "cve": "CVE-2019-19768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19768", "url": "https://www.suse.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "SUSE Bug 1159285 for CVE-2019-19768", "url": "https://bugzilla.suse.com/1159285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19768" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20054" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20054", "url": "https://www.suse.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "SUSE Bug 1159910 for CVE-2019-20054", "url": "https://bugzilla.suse.com/1159910" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-20054" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2019-3701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3701" } ], "notes": [ { "category": "general", "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3701", "url": "https://www.suse.com/security/cve/CVE-2019-3701" }, { "category": "external", "summary": "SUSE Bug 1120386 for CVE-2019-3701", "url": "https://bugzilla.suse.com/1120386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-3701" }, { "cve": "CVE-2019-5108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5108" } ], "notes": [ { "category": "general", "text": "An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5108", "url": "https://www.suse.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "SUSE Bug 1159912 for CVE-2019-5108", "url": "https://bugzilla.suse.com/1159912" }, { "category": "external", "summary": "SUSE Bug 1159913 for CVE-2019-5108", "url": "https://bugzilla.suse.com/1159913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-5108" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10942" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10942", "url": "https://www.suse.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "SUSE Bug 1167629 for CVE-2020-10942", "url": "https://bugzilla.suse.com/1167629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-10942" }, { "cve": "CVE-2020-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11494" } ], "notes": [ { "category": "general", "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11494", "url": "https://www.suse.com/security/cve/CVE-2020-11494" }, { "category": "external", "summary": "SUSE Bug 1168424 for CVE-2020-11494", "url": "https://bugzilla.suse.com/1168424" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-11494" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-8647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8647" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8647", "url": "https://www.suse.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1164078 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1164078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-8647" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8649" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8649", "url": "https://www.suse.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1162931 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-8649" }, { "cve": "CVE-2020-8992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8992" } ], "notes": [ { "category": "general", "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8992", "url": "https://www.suse.com/security/cve/CVE-2020-8992" }, { "category": "external", "summary": "SUSE Bug 1164069 for CVE-2020-8992", "url": "https://bugzilla.suse.com/1164069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "low" } ], "title": "CVE-2020-8992" }, { "cve": "CVE-2020-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9383" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9383", "url": "https://www.suse.com/security/cve/CVE-2020-9383" }, { "category": "external", "summary": "SUSE Bug 1165111 for CVE-2020-9383", "url": "https://bugzilla.suse.com/1165111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-26T14:11:09Z", "details": "moderate" } ], "title": "CVE-2020-9383" } ] }
suse-su-2020:1275-1
Vulnerability from csaf_suse
Published
2020-05-14 09:34
Modified
2020-05-14 09:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)
The following non-security bugs were fixed:
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev->pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp->packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
Patchnames
HPE-Helion-OpenStack-8-2020-1275,SUSE-2020-1275,SUSE-OpenStack-Cloud-8-2020-1275,SUSE-OpenStack-Cloud-Crowbar-8-2020-1275,SUSE-SLE-HA-12-SP3-2020-1275,SUSE-SLE-SAP-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-BCL-2020-1275,SUSE-Storage-5-2020-1275
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).\n- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).\n- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).\n- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).\n- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).\n- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).\n- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).\n- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).\n- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).\n- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).\n- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the \u0027MDS\u0027 Microarchitectural Data Sampling attacks were not complete.\n An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)\n\n\nThe following non-security bugs were fixed:\n\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).\n- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- input: add safety guards to input_set_keycode() (bsc#1168075).\n- ipv4: correct gso_size for UFO (bsc#1154844).\n- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- md: add mddev-\u003epers to avoid potential NULL pointer dereference (bsc#1056134).\n- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).\n- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).\n- md: Delete gendisk before cleaning up the request queue (bsc#1056134).\n- md: do not call bitmap_create() while array is quiesced (bsc#1056134).\n- md: do not set In_sync if array is frozen (bsc#1056134).\n- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).\n- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).\n- md: notify about new spare disk in the container (bsc#1056134).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- md/raid10: end bio when the device faulty (bsc#1056134).\n- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).\n- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).\n- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: kABI fix already_offline (bsc#1145929).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1154118).\n- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-1275,SUSE-2020-1275,SUSE-OpenStack-Cloud-8-2020-1275,SUSE-OpenStack-Cloud-Crowbar-8-2020-1275,SUSE-SLE-HA-12-SP3-2020-1275,SUSE-SLE-SAP-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-BCL-2020-1275,SUSE-Storage-5-2020-1275", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1275-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1275-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1275-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" }, { "category": "self", "summary": "SUSE Bug 1056134", "url": "https://bugzilla.suse.com/1056134" }, { "category": "self", "summary": "SUSE Bug 1087813", "url": "https://bugzilla.suse.com/1087813" }, { "category": "self", "summary": "SUSE Bug 1120386", "url": "https://bugzilla.suse.com/1120386" }, { "category": "self", "summary": "SUSE Bug 1133147", "url": "https://bugzilla.suse.com/1133147" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1145929", "url": "https://bugzilla.suse.com/1145929" }, { "category": "self", "summary": "SUSE Bug 1149591", "url": "https://bugzilla.suse.com/1149591" }, { "category": "self", "summary": "SUSE Bug 1154118", "url": "https://bugzilla.suse.com/1154118" }, { "category": "self", "summary": "SUSE Bug 1154844", "url": "https://bugzilla.suse.com/1154844" }, { "category": "self", "summary": "SUSE Bug 1155689", "url": "https://bugzilla.suse.com/1155689" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157303", "url": "https://bugzilla.suse.com/1157303" }, { "category": "self", "summary": "SUSE Bug 1157804", "url": "https://bugzilla.suse.com/1157804" }, { "category": "self", "summary": "SUSE Bug 1158021", "url": "https://bugzilla.suse.com/1158021" }, { "category": "self", "summary": "SUSE Bug 1158642", "url": "https://bugzilla.suse.com/1158642" }, { "category": "self", "summary": "SUSE Bug 1158819", "url": "https://bugzilla.suse.com/1158819" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1159285", "url": "https://bugzilla.suse.com/1159285" }, { "category": "self", "summary": "SUSE Bug 1159297", "url": "https://bugzilla.suse.com/1159297" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159910", "url": "https://bugzilla.suse.com/1159910" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1159912", "url": "https://bugzilla.suse.com/1159912" }, { "category": "self", "summary": "SUSE Bug 1160195", "url": "https://bugzilla.suse.com/1160195" }, { "category": "self", "summary": "SUSE Bug 1161586", "url": "https://bugzilla.suse.com/1161586" }, { "category": "self", "summary": "SUSE Bug 1162227", "url": "https://bugzilla.suse.com/1162227" }, { "category": "self", "summary": "SUSE Bug 1162928", "url": "https://bugzilla.suse.com/1162928" }, { "category": "self", "summary": "SUSE Bug 1162929", "url": "https://bugzilla.suse.com/1162929" }, { "category": "self", "summary": "SUSE Bug 1162931", "url": "https://bugzilla.suse.com/1162931" }, { "category": "self", "summary": "SUSE Bug 1163508", "url": "https://bugzilla.suse.com/1163508" }, { "category": "self", "summary": "SUSE Bug 1163971", "url": "https://bugzilla.suse.com/1163971" }, { "category": "self", "summary": "SUSE Bug 1164009", "url": "https://bugzilla.suse.com/1164009" }, { "category": "self", "summary": "SUSE Bug 1164051", "url": "https://bugzilla.suse.com/1164051" }, { "category": "self", "summary": "SUSE Bug 1164069", "url": "https://bugzilla.suse.com/1164069" }, { "category": "self", "summary": "SUSE Bug 1164078", "url": "https://bugzilla.suse.com/1164078" }, { "category": "self", "summary": "SUSE Bug 1164846", "url": "https://bugzilla.suse.com/1164846" }, { "category": "self", "summary": "SUSE Bug 1165111", "url": "https://bugzilla.suse.com/1165111" }, { "category": "self", "summary": "SUSE Bug 1165311", "url": "https://bugzilla.suse.com/1165311" }, { "category": "self", "summary": "SUSE Bug 1165873", "url": "https://bugzilla.suse.com/1165873" }, { "category": "self", "summary": "SUSE Bug 1165881", "url": "https://bugzilla.suse.com/1165881" }, { "category": "self", "summary": "SUSE Bug 1165984", "url": "https://bugzilla.suse.com/1165984" }, { "category": "self", "summary": "SUSE Bug 1165985", "url": "https://bugzilla.suse.com/1165985" }, { "category": "self", "summary": "SUSE Bug 1167421", "url": "https://bugzilla.suse.com/1167421" }, { "category": "self", "summary": "SUSE Bug 1167423", "url": "https://bugzilla.suse.com/1167423" }, { "category": "self", "summary": "SUSE Bug 1167629", "url": "https://bugzilla.suse.com/1167629" }, { "category": "self", "summary": "SUSE Bug 1168075", "url": "https://bugzilla.suse.com/1168075" }, { "category": "self", "summary": "SUSE Bug 1168295", "url": "https://bugzilla.suse.com/1168295" }, { "category": "self", "summary": "SUSE Bug 1168424", "url": "https://bugzilla.suse.com/1168424" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170847", "url": "https://bugzilla.suse.com/1170847" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18255 page", "url": "https://www.suse.com/security/cve/CVE-2017-18255/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-21008 page", "url": "https://www.suse.com/security/cve/CVE-2018-21008/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18675 page", "url": "https://www.suse.com/security/cve/CVE-2019-18675/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19066 page", "url": "https://www.suse.com/security/cve/CVE-2019-19066/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19319 page", "url": "https://www.suse.com/security/cve/CVE-2019-19319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19767 page", "url": "https://www.suse.com/security/cve/CVE-2019-19767/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19768 page", "url": "https://www.suse.com/security/cve/CVE-2019-19768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20054 page", "url": "https://www.suse.com/security/cve/CVE-2019-20054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3701 page", "url": "https://www.suse.com/security/cve/CVE-2019-3701/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5108 page", "url": "https://www.suse.com/security/cve/CVE-2019-5108/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10942 page", "url": "https://www.suse.com/security/cve/CVE-2020-10942/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11494 page", "url": "https://www.suse.com/security/cve/CVE-2020-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8647 page", "url": "https://www.suse.com/security/cve/CVE-2020-8647/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8649 page", "url": "https://www.suse.com/security/cve/CVE-2020-8649/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8992 page", "url": "https://www.suse.com/security/cve/CVE-2020-8992/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9383 page", "url": "https://www.suse.com/security/cve/CVE-2020-9383/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-05-14T09:34:21Z", "generator": { "date": "2020-05-14T09:34:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1275-1", "initial_release_date": "2020-05-14T09:34:21Z", "revision_history": [ { "date": "2020-05-14T09:34:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.116.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.116.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.116.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.116.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.116.1.aarch64", "product_id": "kernel-default-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.116.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.116.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.116.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.116.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.116.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.116.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.116.1.aarch64", "product_id": "kernel-syms-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.116.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.116.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.116.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.116.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.116.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.116.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.116.1.noarch", "product_id": "kernel-devel-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.116.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.116.1.noarch", "product_id": "kernel-macros-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.116.1.noarch", "product": { "name": "kernel-source-4.4.180-94.116.1.noarch", "product_id": "kernel-source-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.116.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.116.1.noarch", "product_id": "kernel-docs-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.116.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.116.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.116.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.116.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.116.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.116.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.116.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.116.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.116.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.116.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.116.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.116.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.116.1.ppc64le", "product_id": "kernel-default-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.116.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.116.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.116.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.116.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.116.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.116.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.116.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.116.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-4.4.180-94.116.1.s390x", "product_id": "kernel-default-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.116.1.s390x", "product_id": "kernel-default-base-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.116.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.116.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.116.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.116.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.116.1.s390x", "product_id": "kernel-default-man-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.116.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.116.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.116.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.116.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.116.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.116.1.s390x", "product_id": "kernel-syms-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.116.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.116.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.116.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.116.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.116.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.116.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.116.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.116.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.116.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.116.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.116.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.116.1.x86_64", "product_id": "kernel-default-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.116.1.x86_64", "product_id": "kernel-syms-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.116.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.116.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.116.1.x86_64", "product_id": "kernel-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.116.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.116.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.116.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.116.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.116.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.116.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.116.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.116.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.116.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.116.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.116.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18255", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18255" } ], "notes": [ { "category": "general", "text": "The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18255", "url": "https://www.suse.com/security/cve/CVE-2017-18255" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18255", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087813 for CVE-2017-18255", "url": "https://bugzilla.suse.com/1087813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2017-18255" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-21008", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-21008" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-21008", "url": "https://www.suse.com/security/cve/CVE-2018-21008" }, { "category": "external", "summary": "SUSE Bug 1149591 for CVE-2018-21008", "url": "https://bugzilla.suse.com/1149591" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2018-21008" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-18675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18675" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18675", "url": "https://www.suse.com/security/cve/CVE-2019-18675" }, { "category": "external", "summary": "SUSE Bug 1157804 for CVE-2019-18675", "url": "https://bugzilla.suse.com/1157804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-18675" }, { "cve": "CVE-2019-19066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19066" } ], "notes": [ { "category": "general", "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19066", "url": "https://www.suse.com/security/cve/CVE-2019-19066" }, { "category": "external", "summary": "SUSE Bug 1157303 for CVE-2019-19066", "url": "https://bugzilla.suse.com/1157303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-19066" }, { "cve": "CVE-2019-19319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19319", "url": "https://www.suse.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "SUSE Bug 1158021 for CVE-2019-19319", "url": "https://bugzilla.suse.com/1158021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-19319" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-19767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19767" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19767", "url": "https://www.suse.com/security/cve/CVE-2019-19767" }, { "category": "external", "summary": "SUSE Bug 1159297 for CVE-2019-19767", "url": "https://bugzilla.suse.com/1159297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-19767" }, { "cve": "CVE-2019-19768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19768", "url": "https://www.suse.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "SUSE Bug 1159285 for CVE-2019-19768", "url": "https://bugzilla.suse.com/1159285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-19768" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20054" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20054", "url": "https://www.suse.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "SUSE Bug 1159910 for CVE-2019-20054", "url": "https://bugzilla.suse.com/1159910" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-20054" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2019-3701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3701" } ], "notes": [ { "category": "general", "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3701", "url": "https://www.suse.com/security/cve/CVE-2019-3701" }, { "category": "external", "summary": "SUSE Bug 1120386 for CVE-2019-3701", "url": "https://bugzilla.suse.com/1120386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-3701" }, { "cve": "CVE-2019-5108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5108" } ], "notes": [ { "category": "general", "text": "An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5108", "url": "https://www.suse.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "SUSE Bug 1159912 for CVE-2019-5108", "url": "https://bugzilla.suse.com/1159912" }, { "category": "external", "summary": "SUSE Bug 1159913 for CVE-2019-5108", "url": "https://bugzilla.suse.com/1159913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "important" } ], "title": "CVE-2019-5108" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10942" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10942", "url": "https://www.suse.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "SUSE Bug 1167629 for CVE-2020-10942", "url": "https://bugzilla.suse.com/1167629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-10942" }, { "cve": "CVE-2020-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11494" } ], "notes": [ { "category": "general", "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11494", "url": "https://www.suse.com/security/cve/CVE-2020-11494" }, { "category": "external", "summary": "SUSE Bug 1168424 for CVE-2020-11494", "url": "https://bugzilla.suse.com/1168424" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-11494" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-8647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8647" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8647", "url": "https://www.suse.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1164078 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1164078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-8647" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8649" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8649", "url": "https://www.suse.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1162931 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-8649" }, { "cve": "CVE-2020-8992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8992" } ], "notes": [ { "category": "general", "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8992", "url": "https://www.suse.com/security/cve/CVE-2020-8992" }, { "category": "external", "summary": "SUSE Bug 1164069 for CVE-2020-8992", "url": "https://bugzilla.suse.com/1164069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "low" } ], "title": "CVE-2020-8992" }, { "cve": "CVE-2020-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9383" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9383", "url": "https://www.suse.com/security/cve/CVE-2020-9383" }, { "category": "external", "summary": "SUSE Bug 1165111 for CVE-2020-9383", "url": "https://bugzilla.suse.com/1165111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-05-14T09:34:21Z", "details": "moderate" } ], "title": "CVE-2020-9383" } ] }
suse-su-2020:1663-1
Vulnerability from csaf_suse
Published
2020-06-18 09:17
Modified
2020-06-18 09:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).
- CVE-2020-8992: Fixed an issue which could have allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).
- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel panic (bsc#1168276).
- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8428: Fixed a use-after-free which could have allowed local users to cause a denial of service (bsc#1162109).
- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).
- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-11609: Fixed a null pointer dereference due to improper handling of descriptors (bsc#1168854).
- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB (bsc#1168829).
- CVE-2020-11494: Fixed an issue which could have allowed attackers to read uninitialized can_frame data (bsc#1168424).
- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9458: Fixed a use after free due to a race condition which could have led to privilege escalation of privilege (bsc#1168295).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bsc#1120386).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which could have caused denial of service (bsc#1159908).
- CVE-2019-20095: Fixed an improper error-handling cases that did not free allocated hostcmd memory which was causing memory leak (bsc#1159909).
- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have caused denial of service (bsc#1159841).
- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of port disconnection during discovery (bsc#1159911).
- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem image (bsc#1158819).
- CVE-2019-19319: Fixed a user after free when a large old_size value is used in a memset call (bsc#1158021).
- CVE-2019-19318: Fixed a use after free via a crafted btrfs image (bsc#1158026).
- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which could have allowed attackers to cause a denial of service (bsc#1161518).
- CVE-2019-19045: Fixed a memory leak in which could have allowed attackers to cause a denial of service (bsc#1161522).
- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node (bsc#1157692).
- CVE-2019-16994: Fixed a memory leak which might have caused denial of service (bsc#1161523).
- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver (bsc#1157155).
- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver (bsc#1157157).
- CVE-2019-14615: Fixed an improper control flow in certain data structures which could have led to information disclosure (bsc#1160195).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- 6pack,mkiss: fix possible deadlock (bsc#1051510).
- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).
- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).
- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).
- af_packet: set defaule value for tmo (bsc#1051510).
- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).
- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).
- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).
- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).
- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).
- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).
- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).
- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).
- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).
- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).
- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).
- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).
- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).
- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).
- ALSA: sh: Fix compile warning wrt const (git-fixes).
- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).
- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).
- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).
- arm64: Revert support for execute-only user mappings (bsc#1160218).
- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).
- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).
- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).
- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).
- ASoC: wm8962: fix lambda value (git-fixes).
- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).
- ath9k: fix storage endpoint lookup (git-fixes).
- a typo in %kernel_base_conflicts macro name
- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).
- bcma: remove set but not used variable 'sizel' (git-fixes).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- bonding: fix active-backup transition after link failure (git-fixes).
- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).
- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).
- brcmfmac: fix interface sanity check (git-fixes).
- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).
- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).
- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).
- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).
- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).
- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).
- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).
- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).
- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).
- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).
- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).
- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).
- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).
- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).
- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).
- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).
- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).
- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).
- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).
- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).
- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).
- btrfs: skip log replay on orphaned roots (bsc#1161935).
- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).
- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).
- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).
- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).
- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).
- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).
- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).
- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).
- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).
- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1051510).
- cfg80211: check for set_wiphy_params (bsc#1051510).
- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).
- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).
- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).
- CIFS: add support for flock (bsc#1144333).
- CIFS: Close cached root handle only if it had a lease (bsc#1144333).
- CIFS: Close open handle after interrupted close (bsc#1144333).
- CIFS: close the shared root handle on tree disconnect (bsc#1144333).
- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).
- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).
- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).
- CIFS: Fix mount options set in automount (bsc#1144333).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).
- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).
- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).
- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).
- CIFS: Properly process SMB3 lease breaks (bsc#1144333).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1144333).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).
- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).
- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).
- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).
- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).
- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170621).
- copy/pasted 'Recommends:' instead of 'Provides:', 'Obsoletes:' and 'Conflicts:
- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).
- crypto: api - Check spawn->alg under lock in crypto_drop_spawn (bsc#1051510).
- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).
- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).
- crypto: ccp - fix uninitialized list head (bsc#1051510).
- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).
- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).
- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).
- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).
- debugfs: add support for more elaborate ->d_fsdata (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: call debugfs_real_fops() only after debugfs_file_get() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198). Prerequisite for bsc#1159198.
- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: implement per-file removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: purge obsolete SRCU based removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite for bsc#1159198.
- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).
- dmaengine: coh901318: Remove unused variable (bsc#1051510).
- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).
- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).
- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).
- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170617).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170617).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170617).
- drm/amdgpu: add function parameter description in 'amdgpu_gart_bind' (bsc#1051510).
- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).
- drm/amdgpu: remove always false comparison in 'amdgpu_atombios_i2c_process_i2c_ch' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'amdgpu_connector' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig_connector' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap' from 'gfx_v6_0.c' and 'gfx_v7_0.c' (bsc#1051510).
- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).
- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).
- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).
- drm/i810: Prevent underflow in ioctl (bsc#1114279)
- drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).
- drm/i915: Fix pid leak with banned clients (bsc#1114279)
- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).
- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).
- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).
- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).
- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)
- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)
- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).
- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).
- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).
- exit: panic before exit_mm() on global init exit (bsc#1161549).
- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).
- firestream: fix memory leaks (bsc#1051510).
- fix autofs regression caused by follow_managed() changes (bsc#1159271).
- fix dget_parent() fastpath race (bsc#1159271).
- Fix partial checked out tree build ... so that bisection does not break.
- fjes: fix missed check in fjes_acpi_add (bsc#1051510).
- fs: cifs: Fix atime update check vs mtime (bsc#1144333).
- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).
- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).
- futex: Prevent robust futex exit race (bsc#1161555).
- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).
- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).
- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).
- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).
- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).
- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).
- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).
- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).
- i2c: imx: do not print error message on probe defer (bsc#1051510).
- IB/hfi1: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).
- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).
- inet: protect against too small mtu values (networking-stable-19_12_16).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- Input: aiptek - fix endpoint sanity check (bsc#1051510).
- Input: cyttsp4_core - fix use after free bug (bsc#1051510).
- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).
- Input: gtco - fix endpoint sanity check (bsc#1051510).
- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).
- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).
- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).
- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).
- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).
- Input: sur40 - fix interface sanity checks (bsc#1051510).
- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).
- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).
- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).
- iommu: Remove device link to group on failure (bsc#1160755).
- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).
- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).
- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).
- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).
- kABI: protect struct sctp_ep_common (kabi).
- kABI: restore debugfs_remove_recursive() (bsc#1159198).
- kABI workaround for can/skb.h inclusion (bsc#1051510).
- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- KVM: fix spectrev1 gadgets (bsc#1164705).
- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).
- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).
- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).
- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).
- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).
- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).
- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).
- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).
- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).
- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).
- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).
- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).
- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).
- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).
- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).
- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).
- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).
- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).
- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).
- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).
- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).
- media: cec: report Vendor ID after initialization (bsc#1051510).
- media: iguanair: fix endpoint sanity check (bsc#1051510).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).
- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).
- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).
- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).
- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b ('rpm/kernel-subpackage-spec: Unify dependency handling.') Fixes: 3fd22e219f77 ('rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)')
- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).
- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).
- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).
- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).
- mmc: tegra: fix SDR50 tuning override (bsc#1051510).
- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).
- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).
- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).
- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).
- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).
- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).
- net: psample: fix skb_over_panic (networking-stable-19_12_03).
- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).
- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).
- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).
- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).
- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).
- new helper: lookup_positive_unlocked() (bsc#1159271).
- NFC: pn533: fix bulk-message timeout (bsc#1051510).
- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).
- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).
- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).
- orinoco_usb: fix interface sanity check (git-fixes).
- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).
- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).
- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).
- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).
- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).
- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).
- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc: Allow flush_icache_range to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).
- powerpc: Fix vDSO clock_getres() (bsc#1065729).
- powerpc/irq: fix stack overflow verification (bsc#1065729).
- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).
- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).
- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).
- powerpc/powernv: Disable native PCIe port management (bsc#1065729).
- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).
- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).
- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).
- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).
- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).
- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).
- ppp: Adjust indentation into ppp_async_input (git-fixes).
- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).
- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).
- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).
- r8152: add missing endpoint sanity check (bsc#1051510).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).
- regulator: Fix return value of _set_load() stub (bsc#1051510).
- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).
- regulator: rn5t618: fix module aliases (bsc#1051510).
- Revert 'Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers' (bsc#1051510).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).
- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).
- rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' (bsc#1051510).
- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).
- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).
- rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).
- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).
- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).
- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).
- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).
- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).
- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).
- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).
- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).
- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).
- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).
- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).
- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).
- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).
- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).
- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).
- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).
- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).
- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).
- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).
- serial: pl011: Fix DMA ->flush_buffer() (bsc#1051510).
- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).
- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).
- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).
- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).
- sh_eth: fix dumping ARSTR (bsc#1051510).
- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).
- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).
- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).
- sh_eth: fix TXALCR1 offsets (bsc#1051510).
- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).
- smb3: Fix persistent handles reconnect (bsc#1144333).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1144333).
- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).
- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).
- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).
- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).
- spi: tegra114: flush fifos (bsc#1051510).
- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).
- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).
- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).
- staging: rtl8188eu: fix interface sanity check (bsc#1051510).
- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).
- tcp: clear tp->packets_out when purging write queue (bsc#1160560).
- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).
- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).
- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).
- tracing: xen: Ordered comparison of function pointers (git-fixes).
- tty: n_hdlc: fix build on SPARC (bsc#1051510).
- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).
- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).
- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).
- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).
- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).
- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).
- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).
- USB: core: urb: fix URB structure initialization function (bsc#1051510).
- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).
- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).
- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).
- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).
- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).
- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).
- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).
- USB: gadget: pch_udc: fix use after free (bsc#1051510).
- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).
- USB: gadget: Zero ffs_io_data (bsc#1051510).
- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).
- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).
- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).
- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).
- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).
- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).
- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).
- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).
- USB: serial: io_edgeport: use irqsave() in USB's complete callback (bsc#1051510).
- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).
- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).
- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).
- USB: serial: keyspan: handle unbound ports (bsc#1051510).
- USB: serial: opticon: fix control-message timeouts (bsc#1051510).
- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).
- USB: serial: quatech2: handle unbound ports (bsc#1051510).
- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).
- USB: serial: suppress driver bind attributes (bsc#1051510).
- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).
- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).
- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).
- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).
- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617).
- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).
- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).
- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).
- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).
- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).
- x86/mm: Split vmalloc_sync_all() (bsc#1165741).
- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).
- x86/resctrl: Fix potential memory leak (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).
- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).
- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).
- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).
- xhci: make sure interrupts are restored to correct state (bsc#1051510).
- zd1211rw: fix storage endpoint lookup (git-fixes).
Patchnames
SUSE-2020-1663,SUSE-SLE-Module-Live-Patching-15-2020-1663,SUSE-SLE-Product-HA-15-2020-1663,SUSE-SLE-Product-HPC-15-2020-1663,SUSE-SLE-Product-SLES-15-2020-1663,SUSE-SLE-Product-SLES_SAP-15-2020-1663
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).\n- CVE-2020-8992: Fixed an issue which could have allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel panic (bsc#1168276).\n- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8428: Fixed a use-after-free which could have allowed local users to cause a denial of service (bsc#1162109).\n- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-11609: Fixed a null pointer dereference due to improper handling of descriptors (bsc#1168854).\n- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB (bsc#1168829).\n- CVE-2020-11494: Fixed an issue which could have allowed attackers to read uninitialized can_frame data (bsc#1168424).\n- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9458: Fixed a use after free due to a race condition which could have led to privilege escalation of privilege (bsc#1168295).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bsc#1120386).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which could have caused denial of service (bsc#1159908).\n- CVE-2019-20095: Fixed an improper error-handling cases that did not free allocated hostcmd memory which was causing memory leak (bsc#1159909).\n- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have caused denial of service (bsc#1159841).\n- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of port disconnection during discovery (bsc#1159911).\n- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem image (bsc#1158819).\n- CVE-2019-19319: Fixed a user after free when a large old_size value is used in a memset call (bsc#1158021).\n- CVE-2019-19318: Fixed a use after free via a crafted btrfs image (bsc#1158026).\n- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which could have allowed attackers to cause a denial of service (bsc#1161518).\n- CVE-2019-19045: Fixed a memory leak in which could have allowed attackers to cause a denial of service (bsc#1161522).\n- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node (bsc#1157692).\n- CVE-2019-16994: Fixed a memory leak which might have caused denial of service (bsc#1161523).\n- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14615: Fixed an improper control flow in certain data structures which could have led to information disclosure (bsc#1160195).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- a typo in %kernel_base_conflicts macro name\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- CIFS: add support for flock (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: close the shared root handle on tree disconnect (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170621).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- debugfs: add support for more elaborate -\u003ed_fsdata (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: call debugfs_real_fops() only after debugfs_file_get() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198). Prerequisite for bsc#1159198.\n- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: implement per-file removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: purge obsolete SRCU based removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite for bsc#1159198.\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170617).\n- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170617).\n- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170617).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- futex: Prevent robust futex exit race (bsc#1161555).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: restore debugfs_remove_recursive() (bsc#1159198).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- KEYS: reaching the keys quotas correctly (bsc#1171689).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1663,SUSE-SLE-Module-Live-Patching-15-2020-1663,SUSE-SLE-Product-HA-15-2020-1663,SUSE-SLE-Product-HPC-15-2020-1663,SUSE-SLE-Product-SLES-15-2020-1663,SUSE-SLE-Product-SLES_SAP-15-2020-1663", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1663-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1663-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201663-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1663-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051858", "url": "https://bugzilla.suse.com/1051858" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1109911", "url": "https://bugzilla.suse.com/1109911" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1120386", "url": "https://bugzilla.suse.com/1120386" }, { "category": "self", "summary": "SUSE Bug 1134973", "url": "https://bugzilla.suse.com/1134973" }, { "category": "self", "summary": "SUSE Bug 1143959", "url": "https://bugzilla.suse.com/1143959" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151910", "url": "https://bugzilla.suse.com/1151910" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1153917", "url": "https://bugzilla.suse.com/1153917" }, { "category": "self", "summary": "SUSE Bug 1154243", "url": "https://bugzilla.suse.com/1154243" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156286", "url": "https://bugzilla.suse.com/1156286" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157692", "url": "https://bugzilla.suse.com/1157692" }, { "category": "self", "summary": "SUSE Bug 1158013", "url": "https://bugzilla.suse.com/1158013" }, { "category": "self", "summary": "SUSE Bug 1158021", "url": "https://bugzilla.suse.com/1158021" }, { "category": "self", "summary": "SUSE Bug 1158026", "url": "https://bugzilla.suse.com/1158026" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158819", "url": "https://bugzilla.suse.com/1158819" }, { "category": "self", "summary": "SUSE Bug 1159028", "url": "https://bugzilla.suse.com/1159028" }, { "category": "self", "summary": "SUSE Bug 1159198", "url": "https://bugzilla.suse.com/1159198" }, { "category": "self", "summary": "SUSE Bug 1159271", "url": "https://bugzilla.suse.com/1159271" }, { "category": "self", "summary": "SUSE Bug 1159285", "url": "https://bugzilla.suse.com/1159285" }, { "category": "self", "summary": "SUSE Bug 1159394", "url": "https://bugzilla.suse.com/1159394" }, { "category": "self", "summary": "SUSE Bug 1159483", "url": "https://bugzilla.suse.com/1159483" }, { "category": "self", "summary": "SUSE Bug 1159484", "url": "https://bugzilla.suse.com/1159484" }, { "category": "self", "summary": "SUSE Bug 1159569", "url": "https://bugzilla.suse.com/1159569" }, { "category": "self", "summary": "SUSE Bug 1159588", "url": "https://bugzilla.suse.com/1159588" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159909", "url": "https://bugzilla.suse.com/1159909" }, { "category": "self", "summary": "SUSE Bug 1159910", "url": "https://bugzilla.suse.com/1159910" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1159955", "url": "https://bugzilla.suse.com/1159955" }, { "category": "self", "summary": "SUSE Bug 1160195", "url": "https://bugzilla.suse.com/1160195" }, { "category": "self", "summary": "SUSE Bug 1160210", "url": "https://bugzilla.suse.com/1160210" }, { "category": "self", "summary": "SUSE Bug 1160211", "url": "https://bugzilla.suse.com/1160211" }, { "category": "self", "summary": "SUSE Bug 1160218", "url": "https://bugzilla.suse.com/1160218" }, { "category": "self", "summary": "SUSE Bug 1160433", "url": "https://bugzilla.suse.com/1160433" }, { "category": "self", "summary": "SUSE Bug 1160442", "url": "https://bugzilla.suse.com/1160442" }, { "category": "self", "summary": "SUSE Bug 1160476", "url": "https://bugzilla.suse.com/1160476" }, { "category": "self", "summary": "SUSE Bug 1160560", "url": "https://bugzilla.suse.com/1160560" }, { "category": "self", "summary": "SUSE Bug 1160755", "url": "https://bugzilla.suse.com/1160755" }, { "category": "self", "summary": "SUSE Bug 1160756", "url": "https://bugzilla.suse.com/1160756" }, { "category": "self", "summary": "SUSE Bug 1160784", "url": "https://bugzilla.suse.com/1160784" }, { "category": "self", "summary": "SUSE Bug 1160787", "url": "https://bugzilla.suse.com/1160787" }, { "category": "self", "summary": "SUSE Bug 1160802", "url": "https://bugzilla.suse.com/1160802" }, { "category": "self", "summary": "SUSE Bug 1160803", "url": "https://bugzilla.suse.com/1160803" }, { "category": "self", "summary": "SUSE Bug 1160804", "url": "https://bugzilla.suse.com/1160804" }, { "category": "self", "summary": "SUSE Bug 1160917", "url": "https://bugzilla.suse.com/1160917" }, { "category": "self", "summary": "SUSE Bug 1160966", "url": "https://bugzilla.suse.com/1160966" }, { "category": "self", "summary": "SUSE Bug 1161087", "url": "https://bugzilla.suse.com/1161087" }, { "category": "self", "summary": "SUSE Bug 1161514", "url": "https://bugzilla.suse.com/1161514" }, { "category": "self", "summary": "SUSE Bug 1161518", "url": "https://bugzilla.suse.com/1161518" }, { "category": "self", "summary": "SUSE Bug 1161522", "url": "https://bugzilla.suse.com/1161522" }, { "category": "self", "summary": "SUSE Bug 1161523", "url": "https://bugzilla.suse.com/1161523" }, { "category": "self", "summary": "SUSE Bug 1161549", "url": "https://bugzilla.suse.com/1161549" }, { "category": "self", "summary": "SUSE Bug 1161552", "url": "https://bugzilla.suse.com/1161552" }, { "category": "self", "summary": "SUSE Bug 1161555", "url": "https://bugzilla.suse.com/1161555" }, { "category": "self", "summary": "SUSE Bug 1161674", "url": "https://bugzilla.suse.com/1161674" }, { "category": "self", "summary": "SUSE Bug 1161931", "url": "https://bugzilla.suse.com/1161931" }, { "category": "self", "summary": "SUSE Bug 1161933", "url": "https://bugzilla.suse.com/1161933" }, { "category": "self", "summary": "SUSE Bug 1161934", "url": "https://bugzilla.suse.com/1161934" }, { "category": "self", "summary": "SUSE Bug 1161935", "url": "https://bugzilla.suse.com/1161935" }, { "category": "self", "summary": "SUSE Bug 1161936", "url": "https://bugzilla.suse.com/1161936" }, { "category": "self", "summary": "SUSE Bug 1161937", "url": "https://bugzilla.suse.com/1161937" }, { "category": "self", "summary": "SUSE Bug 1161951", "url": "https://bugzilla.suse.com/1161951" }, { "category": "self", "summary": "SUSE Bug 1162067", "url": "https://bugzilla.suse.com/1162067" }, { "category": "self", "summary": "SUSE Bug 1162109", "url": "https://bugzilla.suse.com/1162109" }, { "category": "self", "summary": "SUSE Bug 1162139", "url": "https://bugzilla.suse.com/1162139" }, { "category": "self", "summary": "SUSE Bug 1162928", "url": "https://bugzilla.suse.com/1162928" }, { "category": "self", "summary": "SUSE Bug 1162929", "url": "https://bugzilla.suse.com/1162929" }, { "category": "self", "summary": "SUSE Bug 1162931", "url": "https://bugzilla.suse.com/1162931" }, { "category": "self", "summary": "SUSE Bug 1163971", "url": "https://bugzilla.suse.com/1163971" }, { "category": "self", "summary": "SUSE Bug 1164051", "url": "https://bugzilla.suse.com/1164051" }, { "category": "self", "summary": "SUSE Bug 1164069", "url": "https://bugzilla.suse.com/1164069" }, { "category": "self", "summary": "SUSE Bug 1164078", "url": "https://bugzilla.suse.com/1164078" }, { "category": "self", "summary": "SUSE Bug 1164705", "url": "https://bugzilla.suse.com/1164705" }, { "category": "self", "summary": "SUSE Bug 1164712", "url": "https://bugzilla.suse.com/1164712" }, { "category": "self", "summary": "SUSE Bug 1164727", "url": "https://bugzilla.suse.com/1164727" }, { "category": "self", "summary": "SUSE Bug 1164728", "url": "https://bugzilla.suse.com/1164728" }, { "category": "self", "summary": "SUSE Bug 1164729", "url": "https://bugzilla.suse.com/1164729" }, { "category": "self", "summary": "SUSE Bug 1164730", "url": "https://bugzilla.suse.com/1164730" }, { "category": "self", "summary": "SUSE Bug 1164731", "url": "https://bugzilla.suse.com/1164731" }, { "category": "self", "summary": "SUSE Bug 1164732", "url": "https://bugzilla.suse.com/1164732" }, { "category": "self", "summary": "SUSE Bug 1164733", "url": "https://bugzilla.suse.com/1164733" }, { "category": "self", "summary": "SUSE Bug 1164734", "url": "https://bugzilla.suse.com/1164734" }, { "category": "self", "summary": "SUSE Bug 1164735", "url": "https://bugzilla.suse.com/1164735" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165111", "url": "https://bugzilla.suse.com/1165111" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1165873", "url": "https://bugzilla.suse.com/1165873" }, { "category": "self", "summary": "SUSE Bug 1165881", "url": "https://bugzilla.suse.com/1165881" }, { "category": "self", "summary": "SUSE Bug 1165984", "url": "https://bugzilla.suse.com/1165984" }, { "category": "self", "summary": "SUSE Bug 1165985", "url": "https://bugzilla.suse.com/1165985" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167421", "url": "https://bugzilla.suse.com/1167421" }, { "category": "self", "summary": "SUSE Bug 1167423", "url": "https://bugzilla.suse.com/1167423" }, { "category": "self", "summary": "SUSE Bug 1167629", "url": "https://bugzilla.suse.com/1167629" }, { "category": "self", "summary": "SUSE Bug 1168075", "url": "https://bugzilla.suse.com/1168075" }, { "category": "self", "summary": "SUSE Bug 1168276", "url": "https://bugzilla.suse.com/1168276" }, { "category": "self", "summary": "SUSE Bug 1168295", "url": "https://bugzilla.suse.com/1168295" }, { "category": "self", "summary": "SUSE Bug 1168424", "url": "https://bugzilla.suse.com/1168424" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171689", "url": "https://bugzilla.suse.com/1171689" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16994 page", "url": "https://www.suse.com/security/cve/CVE-2019-16994/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19036 page", "url": "https://www.suse.com/security/cve/CVE-2019-19036/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19045 page", "url": "https://www.suse.com/security/cve/CVE-2019-19045/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19054 page", "url": "https://www.suse.com/security/cve/CVE-2019-19054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19318 page", "url": "https://www.suse.com/security/cve/CVE-2019-19318/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19319 page", "url": "https://www.suse.com/security/cve/CVE-2019-19319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19768 page", "url": "https://www.suse.com/security/cve/CVE-2019-19768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19770 page", "url": "https://www.suse.com/security/cve/CVE-2019-19770/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20054 page", "url": "https://www.suse.com/security/cve/CVE-2019-20054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20095 page", "url": "https://www.suse.com/security/cve/CVE-2019-20095/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3701 page", "url": "https://www.suse.com/security/cve/CVE-2019-3701/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10942 page", "url": "https://www.suse.com/security/cve/CVE-2020-10942/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11494 page", "url": "https://www.suse.com/security/cve/CVE-2020-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7053 page", "url": "https://www.suse.com/security/cve/CVE-2020-7053/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8428 page", "url": "https://www.suse.com/security/cve/CVE-2020-8428/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8647 page", "url": "https://www.suse.com/security/cve/CVE-2020-8647/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8649 page", "url": "https://www.suse.com/security/cve/CVE-2020-8649/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8834 page", "url": "https://www.suse.com/security/cve/CVE-2020-8834/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8992 page", "url": "https://www.suse.com/security/cve/CVE-2020-8992/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9383 page", "url": "https://www.suse.com/security/cve/CVE-2020-9383/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-18T09:17:44Z", "generator": { "date": "2020-06-18T09:17:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1663-1", "initial_release_date": "2020-06-18T09:17:44Z", "revision_history": [ { "date": "2020-06-18T09:17:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.52.1.aarch64", "product_id": "kernel-syms-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.52.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.52.1.noarch", "product_id": "kernel-devel-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.52.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.52.1.noarch", "product_id": "kernel-docs-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.52.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.52.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.52.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.52.1.noarch", "product_id": "kernel-macros-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.52.1.noarch", "product": { "name": "kernel-source-4.12.14-150.52.1.noarch", "product_id": "kernel-source-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.52.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-4.12.14-150.52.1.s390x", "product_id": "kernel-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.52.1.s390x", "product_id": "kernel-default-base-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.52.1.s390x", "product_id": "kernel-default-man-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.52.1.s390x", "product_id": "kernel-syms-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.52.1.x86_64", "product_id": "kernel-syms-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-16994", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16994" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16994", "url": "https://www.suse.com/security/cve/CVE-2019-16994" }, { "category": "external", "summary": "SUSE Bug 1161523 for CVE-2019-16994", "url": "https://bugzilla.suse.com/1161523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-16994" }, { "cve": "CVE-2019-19036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19036" } ], "notes": [ { "category": "general", "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19036", "url": "https://www.suse.com/security/cve/CVE-2019-19036" }, { "category": "external", "summary": "SUSE Bug 1157692 for CVE-2019-19036", "url": "https://bugzilla.suse.com/1157692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19036" }, { "cve": "CVE-2019-19045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19045" } ], "notes": [ { "category": "general", "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19045", "url": "https://www.suse.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "SUSE Bug 1161522 for CVE-2019-19045", "url": "https://bugzilla.suse.com/1161522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19045" }, { "cve": "CVE-2019-19054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19054" } ], "notes": [ { "category": "general", "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19054", "url": "https://www.suse.com/security/cve/CVE-2019-19054" }, { "category": "external", "summary": "SUSE Bug 1161518 for CVE-2019-19054", "url": "https://bugzilla.suse.com/1161518" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19054" }, { "cve": "CVE-2019-19318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19318" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19318", "url": "https://www.suse.com/security/cve/CVE-2019-19318" }, { "category": "external", "summary": "SUSE Bug 1158026 for CVE-2019-19318", "url": "https://bugzilla.suse.com/1158026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19318" }, { "cve": "CVE-2019-19319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19319", "url": "https://www.suse.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "SUSE Bug 1158021 for CVE-2019-19319", "url": "https://bugzilla.suse.com/1158021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19319" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-19768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19768", "url": "https://www.suse.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "SUSE Bug 1159285 for CVE-2019-19768", "url": "https://bugzilla.suse.com/1159285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19768" }, { "cve": "CVE-2019-19770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19770" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19770", "url": "https://www.suse.com/security/cve/CVE-2019-19770" }, { "category": "external", "summary": "SUSE Bug 1159198 for CVE-2019-19770", "url": "https://bugzilla.suse.com/1159198" }, { "category": "external", "summary": "SUSE Bug 1171295 for CVE-2019-19770", "url": "https://bugzilla.suse.com/1171295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19770" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20054" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20054", "url": "https://www.suse.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "SUSE Bug 1159910 for CVE-2019-20054", "url": "https://bugzilla.suse.com/1159910" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20054" }, { "cve": "CVE-2019-20095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20095" } ], "notes": [ { "category": "general", "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20095", "url": "https://www.suse.com/security/cve/CVE-2019-20095" }, { "category": "external", "summary": "SUSE Bug 1159909 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159909" }, { "category": "external", "summary": "SUSE Bug 1159914 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-20095" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-3701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3701" } ], "notes": [ { "category": "general", "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3701", "url": "https://www.suse.com/security/cve/CVE-2019-3701" }, { "category": "external", "summary": "SUSE Bug 1120386 for CVE-2019-3701", "url": "https://bugzilla.suse.com/1120386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-3701" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10942" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10942", "url": "https://www.suse.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "SUSE Bug 1167629 for CVE-2020-10942", "url": "https://bugzilla.suse.com/1167629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10942" }, { "cve": "CVE-2020-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11494" } ], "notes": [ { "category": "general", "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11494", "url": "https://www.suse.com/security/cve/CVE-2020-11494" }, { "category": "external", "summary": "SUSE Bug 1168424 for CVE-2020-11494", "url": "https://bugzilla.suse.com/1168424" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11494" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-7053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7053" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7053", "url": "https://www.suse.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "SUSE Bug 1160966 for CVE-2020-7053", "url": "https://bugzilla.suse.com/1160966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-7053" }, { "cve": "CVE-2020-8428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8428" } ], "notes": [ { "category": "general", "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8428", "url": "https://www.suse.com/security/cve/CVE-2020-8428" }, { "category": "external", "summary": "SUSE Bug 1162109 for CVE-2020-8428", "url": "https://bugzilla.suse.com/1162109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8428" }, { "cve": "CVE-2020-8647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8647" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8647", "url": "https://www.suse.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1164078 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1164078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8647" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8649" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8649", "url": "https://www.suse.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1162931 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8649" }, { "cve": "CVE-2020-8834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8834" } ], "notes": [ { "category": "general", "text": "KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 (\"KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures\") 87a11bb6a7f7 (\"KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode\") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it\u0027s believed the first is the only strictly necessary commit: 6f597c6b63b6 (\"KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()\") 7b0e827c6970 (\"KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm\") 009c872a8bc4 (\"KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file\")", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8834", "url": "https://www.suse.com/security/cve/CVE-2020-8834" }, { "category": "external", "summary": "SUSE Bug 1168276 for CVE-2020-8834", "url": "https://bugzilla.suse.com/1168276" }, { "category": "external", "summary": "SUSE Bug 1173945 for CVE-2020-8834", "url": "https://bugzilla.suse.com/1173945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-8834" }, { "cve": "CVE-2020-8992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8992" } ], "notes": [ { "category": "general", "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8992", "url": "https://www.suse.com/security/cve/CVE-2020-8992" }, { "category": "external", "summary": "SUSE Bug 1164069 for CVE-2020-8992", "url": "https://bugzilla.suse.com/1164069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-8992" }, { "cve": "CVE-2020-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9383" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9383", "url": "https://www.suse.com/security/cve/CVE-2020-9383" }, { "category": "external", "summary": "SUSE Bug 1165111 for CVE-2020-9383", "url": "https://bugzilla.suse.com/1165111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-9383" } ] }
suse-su-2020:14354-1
Vulnerability from csaf_suse
Published
2020-04-30 16:00
Modified
2020-04-30 16:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).
- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).
- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).
- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).
- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).
- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).
- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).
- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).
- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).
- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).
- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).
- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).
- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).
- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).
The following non-security bugs were fixed:
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- block: Fix oops scsi_disk_get() (bsc#1105327).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).
- klist: fix starting point removed bug in klist iterators (bsc#1156652).
- kobject: Export kobject_get_unless_zero() (bsc#1105327).
- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).
- kref: minor cleanup (bsc#1105327).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched: Fix race between task_group and sched_task_group (bsc#1136471).
- sched: Remove lockdep check in sched_move_task() (bsc#1136471).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).
- writeback: fix race that cause writeback hung (bsc#1161358).
- x86: fix speculation bug reporting (bsc#1012382).
Patchnames
slessp4-kernel-source-14354,slexsp3-kernel-source-14354
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).\n- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).\n- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).\n- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).\n- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).\n- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).\n- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).\n- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).\n- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).\n- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).\n- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).\n- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).\n\nThe following non-security bugs were fixed:\n\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- block: Fix oops scsi_disk_get() (bsc#1105327).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).\n- klist: fix starting point removed bug in klist iterators (bsc#1156652).\n- kobject: Export kobject_get_unless_zero() (bsc#1105327).\n- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).\n- kref: minor cleanup (bsc#1105327).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- sched: Fix race between task_group and sched_task_group (bsc#1136471).\n- sched: Remove lockdep check in sched_move_task() (bsc#1136471).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).\n- writeback: fix race that cause writeback hung (bsc#1161358).\n- x86: fix speculation bug reporting (bsc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14354,slexsp3-kernel-source-14354", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14354-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14354-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14354-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1105327", "url": "https://bugzilla.suse.com/1105327" }, { "category": "self", "summary": "SUSE Bug 1131107", "url": "https://bugzilla.suse.com/1131107" }, { "category": "self", "summary": "SUSE Bug 1136471", "url": "https://bugzilla.suse.com/1136471" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146544", "url": "https://bugzilla.suse.com/1146544" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148871", "url": "https://bugzilla.suse.com/1148871" }, { "category": "self", "summary": "SUSE Bug 1149448", "url": "https://bugzilla.suse.com/1149448" }, { "category": "self", "summary": "SUSE Bug 1152631", "url": "https://bugzilla.suse.com/1152631" }, { "category": "self", "summary": "SUSE Bug 1156652", "url": "https://bugzilla.suse.com/1156652" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157070", "url": "https://bugzilla.suse.com/1157070" }, { "category": "self", "summary": "SUSE Bug 1157143", "url": "https://bugzilla.suse.com/1157143" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157303", "url": "https://bugzilla.suse.com/1157303" }, { "category": "self", "summary": "SUSE Bug 1157344", "url": "https://bugzilla.suse.com/1157344" }, { "category": "self", "summary": "SUSE Bug 1157678", "url": "https://bugzilla.suse.com/1157678" }, { "category": "self", "summary": "SUSE Bug 1157804", "url": "https://bugzilla.suse.com/1157804" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158381", "url": "https://bugzilla.suse.com/1158381" }, { "category": "self", "summary": "SUSE Bug 1158410", "url": "https://bugzilla.suse.com/1158410" }, { "category": "self", "summary": "SUSE Bug 1158413", "url": "https://bugzilla.suse.com/1158413" }, { "category": "self", "summary": "SUSE Bug 1158427", "url": "https://bugzilla.suse.com/1158427" }, { "category": "self", "summary": "SUSE Bug 1158445", "url": "https://bugzilla.suse.com/1158445" }, { "category": "self", "summary": "SUSE Bug 1158823", "url": "https://bugzilla.suse.com/1158823" }, { "category": "self", "summary": "SUSE Bug 1158824", "url": "https://bugzilla.suse.com/1158824" }, { "category": "self", "summary": "SUSE Bug 1158834", "url": "https://bugzilla.suse.com/1158834" }, { "category": "self", "summary": "SUSE Bug 1158900", "url": "https://bugzilla.suse.com/1158900" }, { "category": "self", "summary": "SUSE Bug 1158904", "url": "https://bugzilla.suse.com/1158904" }, { "category": "self", "summary": "SUSE Bug 1159285", "url": "https://bugzilla.suse.com/1159285" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1161358", "url": "https://bugzilla.suse.com/1161358" }, { "category": "self", "summary": "SUSE Bug 1162928", "url": "https://bugzilla.suse.com/1162928" }, { "category": "self", "summary": "SUSE Bug 1162929", "url": "https://bugzilla.suse.com/1162929" }, { "category": "self", "summary": "SUSE Bug 1162931", "url": "https://bugzilla.suse.com/1162931" }, { "category": "self", "summary": "SUSE Bug 1164078", "url": "https://bugzilla.suse.com/1164078" }, { "category": "self", "summary": "SUSE Bug 1165111", "url": "https://bugzilla.suse.com/1165111" }, { "category": "self", "summary": "SUSE Bug 1165985", "url": "https://bugzilla.suse.com/1165985" }, { "category": "self", "summary": "SUSE Bug 1167629", "url": "https://bugzilla.suse.com/1167629" }, { "category": "self", "summary": "SUSE Bug 1168075", "url": "https://bugzilla.suse.com/1168075" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15213 page", "url": "https://www.suse.com/security/cve/CVE-2019-15213/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15916 page", "url": "https://www.suse.com/security/cve/CVE-2019-15916/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18660 page", "url": "https://www.suse.com/security/cve/CVE-2019-18660/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18675 page", "url": "https://www.suse.com/security/cve/CVE-2019-18675/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19066 page", "url": "https://www.suse.com/security/cve/CVE-2019-19066/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19073 page", "url": "https://www.suse.com/security/cve/CVE-2019-19073/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19074 page", "url": "https://www.suse.com/security/cve/CVE-2019-19074/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19227 page", "url": "https://www.suse.com/security/cve/CVE-2019-19227/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19523 page", "url": "https://www.suse.com/security/cve/CVE-2019-19523/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19524 page", "url": "https://www.suse.com/security/cve/CVE-2019-19524/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19527 page", "url": "https://www.suse.com/security/cve/CVE-2019-19527/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19530 page", "url": "https://www.suse.com/security/cve/CVE-2019-19530/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19531 page", "url": "https://www.suse.com/security/cve/CVE-2019-19531/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19532 page", "url": "https://www.suse.com/security/cve/CVE-2019-19532/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19537 page", "url": "https://www.suse.com/security/cve/CVE-2019-19537/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19768 page", "url": "https://www.suse.com/security/cve/CVE-2019-19768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10942 page", "url": "https://www.suse.com/security/cve/CVE-2020-10942/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8647 page", "url": "https://www.suse.com/security/cve/CVE-2020-8647/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8649 page", "url": "https://www.suse.com/security/cve/CVE-2020-8649/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9383 page", "url": "https://www.suse.com/security/cve/CVE-2020-9383/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-04-30T16:00:22Z", "generator": { "date": "2020-04-30T16:00:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14354-1", "initial_release_date": "2020-04-30T16:00:22Z", "revision_history": [ { "date": "2020-04-30T16:00:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.111.1.i586", "product": { "name": "kernel-default-3.0.101-108.111.1.i586", "product_id": "kernel-default-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.111.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.111.1.i586", "product_id": "kernel-default-base-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.111.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.111.1.i586", "product_id": "kernel-default-devel-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.111.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.111.1.i586", "product_id": "kernel-ec2-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.111.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.111.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.111.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.111.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.111.1.i586", "product": { "name": "kernel-pae-3.0.101-108.111.1.i586", "product_id": "kernel-pae-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.111.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.111.1.i586", "product_id": "kernel-pae-base-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.111.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.111.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.111.1.i586", "product": { "name": "kernel-source-3.0.101-108.111.1.i586", "product_id": "kernel-source-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.111.1.i586", "product": { "name": "kernel-syms-3.0.101-108.111.1.i586", "product_id": "kernel-syms-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.111.1.i586", "product": { "name": "kernel-trace-3.0.101-108.111.1.i586", "product_id": "kernel-trace-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.111.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.111.1.i586", "product_id": "kernel-trace-base-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.111.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.111.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.111.1.i586", "product": { "name": "kernel-xen-3.0.101-108.111.1.i586", "product_id": "kernel-xen-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.111.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.111.1.i586", "product_id": "kernel-xen-base-3.0.101-108.111.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.111.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.111.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.111.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.111.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.111.1.ppc64", "product_id": "kernel-default-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.111.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.111.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.111.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.111.1.ppc64", "product_id": "kernel-source-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.111.1.ppc64", "product_id": "kernel-syms-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.111.1.ppc64", "product_id": "kernel-trace-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.111.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.111.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.111.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.111.1.s390x", "product": { "name": "kernel-default-3.0.101-108.111.1.s390x", "product_id": "kernel-default-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.111.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.111.1.s390x", "product_id": "kernel-default-base-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.111.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.111.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.111.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.111.1.s390x", "product_id": "kernel-default-man-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.111.1.s390x", "product": { "name": "kernel-source-3.0.101-108.111.1.s390x", "product_id": "kernel-source-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.111.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.111.1.s390x", "product_id": "kernel-syms-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.111.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.111.1.s390x", "product_id": "kernel-trace-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.111.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.111.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.111.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.111.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.111.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.111.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.111.1.x86_64", "product_id": "kernel-default-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.111.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.111.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.111.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.111.1.x86_64", "product_id": "kernel-source-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.111.1.x86_64", "product_id": "kernel-syms-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.111.1.x86_64", "product_id": "kernel-trace-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.111.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.111.1.x86_64", "product_id": "kernel-xen-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.111.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.111.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.111.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586" }, "product_reference": "kernel-default-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586" }, "product_reference": "kernel-source-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.111.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.111.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.111.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.111.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-15213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15213" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15213", "url": "https://www.suse.com/security/cve/CVE-2019-15213" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146544 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146544" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-15213" }, { "cve": "CVE-2019-15916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15916" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15916", "url": "https://www.suse.com/security/cve/CVE-2019-15916" }, { "category": "external", "summary": "SUSE Bug 1149448 for CVE-2019-15916", "url": "https://bugzilla.suse.com/1149448" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "low" } ], "title": "CVE-2019-15916" }, { "cve": "CVE-2019-18660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18660" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18660", "url": "https://www.suse.com/security/cve/CVE-2019-18660" }, { "category": "external", "summary": "SUSE Bug 1157038 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157038" }, { "category": "external", "summary": "SUSE Bug 1157923 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-18660" }, { "cve": "CVE-2019-18675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18675" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18675", "url": "https://www.suse.com/security/cve/CVE-2019-18675" }, { "category": "external", "summary": "SUSE Bug 1157804 for CVE-2019-18675", "url": "https://bugzilla.suse.com/1157804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-18675" }, { "cve": "CVE-2019-19066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19066" } ], "notes": [ { "category": "general", "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19066", "url": "https://www.suse.com/security/cve/CVE-2019-19066" }, { "category": "external", "summary": "SUSE Bug 1157303 for CVE-2019-19066", "url": "https://bugzilla.suse.com/1157303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19066" }, { "cve": "CVE-2019-19073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19073" } ], "notes": [ { "category": "general", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19073", "url": "https://www.suse.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "SUSE Bug 1157070 for CVE-2019-19073", "url": "https://bugzilla.suse.com/1157070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19073" }, { "cve": "CVE-2019-19074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19074" } ], "notes": [ { "category": "general", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19074", "url": "https://www.suse.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "SUSE Bug 1157143 for CVE-2019-19074", "url": "https://bugzilla.suse.com/1157143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19074" }, { "cve": "CVE-2019-19227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19227" } ], "notes": [ { "category": "general", "text": "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19227", "url": "https://www.suse.com/security/cve/CVE-2019-19227" }, { "category": "external", "summary": "SUSE Bug 1157678 for CVE-2019-19227", "url": "https://bugzilla.suse.com/1157678" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19227" }, { "cve": "CVE-2019-19523", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19523" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19523", "url": "https://www.suse.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19523" }, { "cve": "CVE-2019-19524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19524" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19524", "url": "https://www.suse.com/security/cve/CVE-2019-19524" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158413 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158413" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "low" } ], "title": "CVE-2019-19524" }, { "cve": "CVE-2019-19527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19527" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19527", "url": "https://www.suse.com/security/cve/CVE-2019-19527" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158900 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19527" }, { "cve": "CVE-2019-19530", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19530" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19530", "url": "https://www.suse.com/security/cve/CVE-2019-19530" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158410 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158410" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19530" }, { "cve": "CVE-2019-19531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19531" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19531", "url": "https://www.suse.com/security/cve/CVE-2019-19531" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158427 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158427" }, { "category": "external", "summary": "SUSE Bug 1158445 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158445" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "low" } ], "title": "CVE-2019-19531" }, { "cve": "CVE-2019-19532", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19532" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19532", "url": "https://www.suse.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158824 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158824" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19532" }, { "cve": "CVE-2019-19537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19537" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19537", "url": "https://www.suse.com/security/cve/CVE-2019-19537" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158904 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19537" }, { "cve": "CVE-2019-19768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19768", "url": "https://www.suse.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "SUSE Bug 1159285 for CVE-2019-19768", "url": "https://bugzilla.suse.com/1159285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19768" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2020-10942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10942" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10942", "url": "https://www.suse.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "SUSE Bug 1167629 for CVE-2020-10942", "url": "https://bugzilla.suse.com/1167629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-10942" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-8647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8647" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8647", "url": "https://www.suse.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1164078 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1164078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-8647" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8649" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8649", "url": "https://www.suse.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1162931 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-8649" }, { "cve": "CVE-2020-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9383" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9383", "url": "https://www.suse.com/security/cve/CVE-2020-9383" }, { "category": "external", "summary": "SUSE Bug 1165111 for CVE-2020-9383", "url": "https://bugzilla.suse.com/1165111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-30T16:00:22Z", "details": "moderate" } ], "title": "CVE-2020-9383" } ] }
gsd-2020-11608
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-11608", "description": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "id": "GSD-2020-11608", "references": [ "https://www.suse.com/security/cve/CVE-2020-11608.html", "https://www.debian.org/security/2020/dsa-4698", "https://access.redhat.com/errata/RHSA-2021:1739", "https://access.redhat.com/errata/RHSA-2021:1578", "https://ubuntu.com/security/CVE-2020-11608", "https://advisories.mageia.org/CVE-2020-11608.html", "https://linux.oracle.com/cve/CVE-2020-11608.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-11608" ], "details": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "id": "GSD-2020-11608", "modified": "2023-12-13T01:22:05.196783Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "name": "USN-4345-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4364-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4364-1/" }, { "name": "USN-4368-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4368-1/" }, { "name": "USN-4369-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4369-1/" }, { "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "name": "DSA-4698", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4698" }, { "name": "openSUSE-SU-2020:0801", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.6.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11608" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "name": "USN-4345-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4364-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4364-1/" }, { "name": "USN-4368-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4368-1/" }, { "name": "USN-4369-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4369-1/" }, { "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "name": "DSA-4698", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2020/dsa-4698" }, { "name": "openSUSE-SU-2020:0801", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.6 } }, "lastModifiedDate": "2020-06-13T09:15Z", "publishedDate": "2020-04-07T14:15Z" } } }
fkie_cve-2020-11608
Vulnerability from fkie_nvd
Published
2020-04-07 14:15
Modified
2024-11-21 04:58
Severity ?
Summary
An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html | ||
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 | Mailing List, Patch, Vendor Advisory | |
cve@mitre.org | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30 | Mailing List, Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30 | Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | ||
cve@mitre.org | https://security.netapp.com/advisory/ntap-20200430-0004/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4345-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4364-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4368-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4369-1/ | ||
cve@mitre.org | https://www.debian.org/security/2020/dsa-4698 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30 | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200430-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4345-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4364-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4368-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4369-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4698 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB94C1F6-38C4-44F6-93E8-199096A6F86A", "versionEndExcluding": "5.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el kernel de Linux versiones anteriores a 5.6.1. El archivo drivers/media/usb/gspca/ov519.c, permite desreferencias del puntero NULL en las funciones ov511_mode_init_regs y ov518_mode_init_regs cuando hay cero endpoints, tambi\u00e9n se conoce como CID-998912346c0d." } ], "id": "CVE-2020-11608", "lastModified": "2024-11-21T04:58:13.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-07T14:15:14.090", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4364-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4368-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4369-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2020/dsa-4698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4364-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4368-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4369-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2020/dsa-4698" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-7f4g-r3h4-p23v
Vulnerability from github
Published
2022-05-24 17:13
Modified
2022-05-24 17:13
VLAI Severity ?
Details
An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
{ "affected": [], "aliases": [ "CVE-2020-11608" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-04-07T14:15:00Z", "severity": "LOW" }, "details": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "id": "GHSA-7f4g-r3h4-p23v", "modified": "2022-05-24T17:13:38Z", "published": "2022-05-24T17:13:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" }, { "type": "WEB", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200430-0004" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4345-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4364-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4368-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4369-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2020/dsa-4698" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…